A multi-step attack-correlation method with privacy protection
نویسندگان
چکیده
منابع مشابه
A First Step towards Privacy Leakage Diagnosis and Protection
In this paper, we present a first step for designing a privacy leakage diagnosis and protection system using two privacy definitions and a new definition, and then evaluate a prototype program. The diagnosis is based on major notions of privacy: k-anonymity and (c, l)-diversity. Furthermore, the diagnosis include another method that analyze sensitivity of each attribute values. The prototype pr...
متن کاملAutomatic multi-step attack pattern discovering
Current techniques employed in security alert correlation area for multi-step attack recognition purpose are intricate to be performed due to the complexity of the methods and huge computing workload generated during alert analysis and processing. In this paper, we proposed a new method of alert correlation aiming at providing concentrated security event information and thus finding multi-step ...
متن کاملNew Multi-step Worm Attack Model
The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack patte...
متن کاملA Multi-Step Framework for Detecting Attack Scenarios
With growing dependence upon interconnected networks, defending these networks against intrusions is becoming increasingly important. In the case of attacks that are composed of multiple steps, detecting the entire attack scenario is of vital importance. In this paper, we propose an analysis framework that is able to detect these scenarios with little predefined information. The core of the sys...
متن کاملMapping health data: improved privacy protection with donut method geomasking.
A major challenge in mapping health data is protecting patient privacy while maintaining the spatial resolution necessary for spatial surveillance and outbreak identification. A new adaptive geomasking technique, referred to as the donut method, extends current methods of random displacement by ensuring a user-defined minimum level of geoprivacy. In donut method geomasking, each geocoded addres...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Communications and Information Networks
سال: 2016
ISSN: 2096-1081,2509-3312
DOI: 10.1007/bf03391586